Publications

A Forensic Framework for Tracing Phishers

2008 - Ahmad-Reza Sadeghi, Sebastian Gajek, Felix Gröbert, , Dominik Birk

International Federation for Information Processing, to appear in LNCS 6102. [pdf]

A novel solution for end-to-end integrity protection in signed PGP mail

2008 - Jörg Schwenk, Lijun Liao,

ICICS 2008, Birmingham, UK

Code Voting with Linkable Group Signatures

2008 - Jörg Schwenk, Sven Schäge, Jörg Helbach

3rd International Conference, Co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, August 6th-9th, 2008 in Castle Hofen, Bregenz, Austria 2008. In LNI, 2008. [LNI Link]

Modeling and Transformation of Security Requirements: An Approach for Service-oriented Architectures

2008 - Jörg Schwenk, Meiko Jensen, Ralph Herkenhöner, Sven Feja, Hermann de Meer, Andreas Speck

Proceedings of the First Euro-NF Workshop on Future Internet Architecture: New Trends in Service & Networking Architectures, 21. November 2008, Paris, France

Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation bei SSL/TLS

2008 - Tibor Jager, Heiko Jäkel, Jörg Schwenk

Sicherheit 2008.

Provably Secure Browser-Based User-Aware Mutual Authentication over TLS

2008 - Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis,

Accepted for ASIACCS'08. [ACM Link]

Stronger TLS Bindings for SAML Assertions and SAML Artifacts

2008 - Jörg Schwenk, Sebastian Gajek, Lijun Liao,

In Proceedings of the ACM CCS Workshop for Secure Web Services (ACM SWS'08), Virginia (USA), 2008.

TLS Federation - a Secure and Relying-Party-Friendly Approach for Federated Identity Management

2008 - Jörg Schwenk,

This paper describes a novel approach that integrates Federated IDM and SSL.

Universally Composable Security Analysis of TLS

2008 - Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis, Olivier Pereira

Accepted for the Second Confer­ence on Provable Security (ProvSec), 2008. [pdf]

Trusted User-Aware Web Authentication

2007 - Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Marcel Winandy,

Presented at the Workshop on Trustworthy User Interfaces for Passwords and Personal Information (TIPPI'07), Stanford, USA, June 22, 2007. [PDF]

Compartmented Security for Browsers – Or How to Thwart a Phisher with Trusted Computing

2007 - Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy

In Proceedings of the The Second International Conference on Availability, Reliability and Security (ARES 2007), Vienna, Austria, April 10-13, 2007, pages 120-127. IEEE Computer Society, 2007. [pdf]

A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting

2007 - Ahmad-Reza Sadeghi, Hans Löhr, Liqun Chen, Mark Manulis, Alberto Escalante

11th International Conference on Financial Cryptography and Data Security (FC 2007), Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers, volume 4886 of Lecture Notes on Computer Sience (LNCS), pages 29-44. Springer Verlag, 2007. [pdf]

Phishing Phishers - Observing and Tracing Organized Cybercrime

2007 - Ahmad-Reza Sadeghi, Sebastian Gajek, Felix Gröbert, , Dominik Birk

In Proceedings of the Second International Conference on Internet Monitoring and Protection (ICIMP 2007), Silicon Valley, California, July 1-5, 2007, page 3. IEEE Computer Society, 2007. [IEEE Link]

Aktuelle Gefahren im Onlinebanking-Technische und Juristische Hintergründe.

2007 - Jörg Schwenk, Georg Borges, Sebastian Gajek, Christoph Wegener, Isabelle Biallaß, Julia Meyer, Dennis Werner

In Proceedings of the 10th German IT Security Congress, Federal Office for Information Security, Bonn (Germany), 2007.

Breaking and Fixing the Inline Approach.

2007 - Jörg Schwenk, Sebastian Gajek, Lijun Liao,

In Proceedings of the ACM CCS Workshop for Secure Web Services (ACM SWS'07), Alexandria (USA), 2007 .

Browser Models for Usable Authentication Protocols

2007 - Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis,

Presented at the Workshop on Web 2.0 Security and Privacy (W2SP 2007) held in conjunction with the IEEE Symposium on Security and Privacy, Oakland, California, May 24, 2007. [pdf]

Browser Models for Usable Authentication Protocols.

2007 - Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis,

In Proceedings of the IEEE Security and Privacy Workshop on Web 2.0 Security and Privacy (W2SP'07), Oakland (USA), 2007.

Browser-based Authentication Protocols for Naive Users.

2007 - Jörg Schwenk, Ahmad-Reza Sadeghi, Sebastian Gajek, Mark Manulis,

accepted for presentation at the Western European Workshop on Research in Cryptology (WEWoRC 2007), Bochum (Germany), 2007.

Efficient Hash Collision Search Strategies on Special-Purpose Hardware

2007 - Sven Schäge, Tim Güneysu, Christof Paar

Special-purpose Hardware for Attacking Cryptographic Systems, SHARCS Workshop 2007, September 9-10, 2007, Vienna, Austria.

Efficient Hash Collision Search Strategies on Special-Purpose Hardware

2007 - Sven Schäge, Tim Güneysu, Christof Paar

Western European Workshop on Research in Cryptology, WeWORC Workshop 2007, July 4-6, 2007, Bochum, Germany. [Springer Link]
Page: